lab-5

  1. Scenario:
    You are the cybersecurity expert for a government organization. There is great concern that hackers from another country will infiltrate the government network by using a phishing attack to interfere with our election process. One member send you an email that looks suspicious, in oder to provide law enforcement with as much information as possible you decide to track the sender.

    1. You may use the attached email (.txt) the senders IP is highlighted or choose one from your own email
    2. From own email view the source code (Google it – Depending on your system or browser)
    3. Search the source code (Control+F) enter Sender
    4. Use one of the links below to physically locate the IP
    • Trace the IP 
    • What’s My IP (https://whatismyipaddress.com)
    • In a word document:
    • Copy the source code and paste it “highlight the senders IP”
      • Take a screenshot of the actual location on the IP : You may not get a house address but the city with latitude and longitude will be shown
      • Short Guides – You may need Google “how to view the source code for your specific” device, browser etc… also works on email that are not saved on your device.
        Mac
        Outlook (Windows)
        Web Browser Google or Gmail

        Week 5 – trace IP Physical Location.rtf

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

 

“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

The post lab-5 appeared first on Best Tutors Help.

 

"Is this question part of your assignment? We Can Help!"

Essay Writing Service